Cyber Security

Detecting Obfuscated Command-lines with a Large Language Model

In the security industry, there is a constant, undeniable fact that practitioners must contend with: criminals are working overtime to constantly change the...

7 must-ask questions for leaders on security culture

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions,...

Top 10 tips to protect your privacy and safety during the online shopping season and beyond – Sophos News

Chester Wisniewski is Field CTO Applied Research at next-generation security leader Sophos. With more than 25 years of security experience, his interest in...

A look at Chrome’s security review culture

Posted by Alex Gough, Chrome Security Team Security reviewers must develop the confidence and skills to make fast, difficult decisions. A simplistic piece of...

Gamaredon’s LittleDrifter USB malware spreads beyond Ukraine

A recently discovered worm that researchers call LittleDrifter has been spreading over USB drives infecting systems in multiple countries as part of a...

Malicious Apps Disguised as Banks and Government Agencies Targeting Indian Android Users

Android smartphone users in India are the target of a new malware campaign that employs social engineering lures to install fraudulent apps that...

What Healthcare Cybersecurity Leaders Should Know About the FDA’s Section 524B Guidelines

Recently, the Food and Drug Administration (FDA) issued updated regulations regarding medical devices, specifically related to the cybersecurity requirements of those devices. These...

DinodasRAT used against governmental entity in Guayana – Week in security with Tony Anscombe

Video The backdoor can exfiltrate files, manipulate Windows registry keys, and execute...

Latest articles